Installing multiple operating systems on virtual PC’s, including different Windows versions and Linux

Hyper-V is built in hypervisor client in windows 10 which allows users to create and install other operating systems on virtual PC’s. Hyper-V can run Microsoft operating systems as well as various Linux versions. Before we start learning about Hyper-V let us learn some virtualization terminology:

Virtualization terminology

Hypervisor: Hypervisor can be a computer software, hardware or firmware that is capable of creating and running virtual machines.

Hyper V: Hyper – V is a Microsoft’s official hypervisor which can build virtual machines on X86 – 64 architecture systems. Prior to the launch of Hyper – V, Virtual Pc was the software used for virtualization. Hyper – V came with the release of windows 8.1 as a hardware virtualization component of client editions of windows.

Virtual Machine: A virtual machine is a software computer which is designed in similar computer architecture and functions like a real computer. To run a Virtual machine the physical host should have optimized hardware resources.

Host: Host is a computer running the virtualization platform on it. A host computer has all virtual machines on it.

Guest: A guest operating system that is installed on a virtual machine and which is saved on virtual hard disk is called a guest.

Virtual Hard Disk: A file having .VHD as an extension and which is capable of storing an entire operating system of a virtual machine. It can be used to save files as well.

Virtual Switch

A virtual Switch is similar to a physical switch in terms of functions. A Hyper – V virtual machine cannot directly connect to the network adapters of the physical host computer. A virtual switch acts as a mediator between these two to establish communication in a virtual network. When Hyper – V is enabled one or more virtual adapters are created. You should not disable these adapters as they are used to connect to the virtual switches.

Steps to install Hyper – V in windows 10:

Click on ‘Start Menu’ and select ‘Program and Features’.

Click on ‘Turn Windows features On or OFF’ in the right hand pane.

Select ‘Hyper – V’ feature from the features list and also select the check box on the below roles.

Hyper – V management tools.

Hyper – V platform.

Click ‘Ok’. A message will be displayed stating, “Windows will now install the required components. You have to reboot to let windows finalize the installation.”

Click ‘Restart now’ button.

After the computer ‘Restarts’, click the ‘Start Menu’ and launch the ‘Hyper – V manager’. You should be able to see your computer name on the left side of the Hyper – V manager console.

In the left pane if you do not find any server to connect then, Click ‘Connect to Server’ on the right pane.

Give an appropriate name to the new virtual switch. Select ‘External’ radio button and from the drop down menu select the appropriate adapter that you want to assign to the virtual switch. Click ‘Ok’.

Click ‘Yes’ in the dialog box to apply the changes you just made.

Hyper-V Training

If you wish to learn more about Hyper-V there are many training courses available. QA run several courses at a number of venues in the UK aimed mainly at IT professionals. Microsoft training specialists Paul Brown Training also provide a variety of IT courses at London locations.

Security is considered as the ability of an operating system to enforce control over the storage and transportation of data in and between the objects that the operating system supports. In multi user operating system, the concepts of security and protection are very important. User programs should not interfere with one another or with the operating system. Security systems are those, which control through the use of specific security features, access to information that only properly authorized individuals or processes operating on their behalf will have access to read, write, create or delete. There are 3 main elements of security; Confidentiality, integrity and availability.Confidentiality
Confidentiality ensures that information is not accessed in an unauthorized manner. It is generally related to the read operations.

Integrity
Integrity ensures that the information is not amended or deleted by an unauthorized manner. It is generally related to write operations.

Availability
It ensures that information is available to the authorized users at right time.

Threats to security
Sharing and protection are requirements of modern computing environments. But these two are contradictory to each other as more sharing gives rise to possibility of more security threats. The major threats to the computing security environment are as follows:

Tapping: Unauthorized use of servicing.

Disclosure: Unauthorized disclosure to information.

Amendment: Unauthorized alteration or deletion of information.

Fabrication: Unauthorized fabrication of information.

Denial: Denial of service to the authorized users.

In tapping the third party accesses information without the knowledge of the other two parties. Whereas, in disclosure the source part willingly discloses information to the third party.

Security attacks
The security can be attacked and penetrated in number of ways:

Authentication
Authentication means verification of access to the system resources. Following are some of the ways in which authentication may take place:

By stealing and using someone’s password.

Use of vendor supplied password which can be used by only system administrator.

Finding password by trial and error method.

Writing dummy login programs to fool the user.

Browsing

There exist files with access controls, which are very permissive.

One can browse through the system file to get this information, after which unprotected files/databases could be easily accessed.

Confidential information can be read or even modified.

Trap doors

Sometimes software engineers leave some secret entry point to modify their programs. These are called trap doors.

They can be misused by others.

Electric data capture
Use of active or passive wire traps, or mechanisms to pick up the screen radiation and to recognize what is displayed on screen is called electric data capture.

Invalid parameters

Passing invalid parameters may cause serious security violations.

Line trapping

A special terminal is used to tap into communication line. It causes access to confidential data.

Waste recovery

By using some technique, deleted files can be recovered, password may be recollected.